An authorisation certificate-based access control model

被引:1
|
作者
Li W. [1 ]
He J. [1 ]
Zhu N. [1 ]
Jin S. [1 ]
Teng D. [1 ]
机构
[1] Faculty of Information Technology, Beijing University of Technology, Beijing
关键词
Access control; Access control model; Authorisation certificate; Distributed control; Formalisation;
D O I
10.1504/IJSN.2021.119393
中图分类号
学科分类号
摘要
There are currently many types of access control models and schemes that have been proposed to protect valuable resources in a distributed environment. Many such models have failed to take into consideration efficiency, security, practical implementation and management at the same time. Based on the analysis of conventional certificate-based access control characteristics, this paper proposes an authorisation certificate-based access control (ACBAC) model to realise access control in a distributed environment. Employing certificates in access control can help meet the various requirements in distributed networks or systems while ensuring security to a great extent. Efficiency and security can thus be improved by delegating the functions of making access authorisation decisions to the certificate issuer (CI). We will formally describe the model, introduce the application scenarios and the processes of the model, and provide the details of implementation. Finally, the effectiveness and superiority of the model is verified through experiment and analysis. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:258 / 266
页数:8
相关论文
共 50 条
  • [1] Certificate-based access control for widely distributed resources
    Thompson, M
    Johnston, W
    Mudumbai, S
    Hoo, G
    Jackson, K
    Essiari, A
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 215 - 227
  • [2] Secure Digital Certificate-Based Data Access Control Scheme in Blockchain
    Liu, Bin
    Xiao, Lijun
    Long, Jing
    Tang, Mingdong
    Hosam, Osama
    IEEE ACCESS, 2020, 8 (08): : 91751 - 91760
  • [3] Certificate-Based Anonymous Device Access Control Scheme for IoT Environment
    Malani, Saurav
    Srinivas, Jangirala
    Das, Ashok Kumar
    Srinathan, Kannan
    Jo, Minho
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 9762 - 9773
  • [4] Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model
    Hwang, Seong Oun
    Le, Minh-Ha
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (06) : 5971 - 5981
  • [5] Certificate-based access control in pure P2P networks
    Palomar, Esther
    Estevez-Tapiador, Juan M.
    Hernandez-Castro, Julio C.
    Ribagorda, Arturo
    SIXTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2006, : 177 - +
  • [6] Certificate-Based Encryption Scheme with General Access Structure
    Hyla, Tomasz
    Pejas, Jerzy
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 41 - 55
  • [7] Certificate-based signature scheme in the standard model
    Zhou, Caixue
    Cui, Zongmin
    IET INFORMATION SECURITY, 2017, 11 (05) : 256 - 260
  • [8] Improved certificate-based encryption in the standard model
    Galindo, David
    Morillo, Paz
    Rafols, Carla
    JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) : 1218 - 1226
  • [9] Efficient Certificate-Based Encryption in the Standard Model
    Liu, Joseph K.
    Zhou, Jianying
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 144 - 155
  • [10] Certificate-based encryption and the certificate revocation problem
    Gentry, C
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 272 - 293